Indistinguishability obfuscation from well-founded assumptions
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …
programs into unintelligible ones while preserving functionality. It is a fascinating and …
Candidate obfuscation via oblivious LWE sampling
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …
A survey on cryptographic techniques for protecting big data security: present and forthcoming
S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …
and provide novel ways of exploring the world. As they significantly create economic and …
Indistinguishability obfuscation from circular security
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …
Candidate witness encryption from lattice techniques
R Tsabary - Annual International Cryptology Conference, 2022 - Springer
Witness encryption (WE), first introduced by Garg, Gentry, Sahai and Waters in, is an
encryption scheme where messages are encrypted with respect to instances of an NP …
encryption scheme where messages are encrypted with respect to instances of an NP …
Witness encryption and null-IO from evasive LWE
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to
encrypt a message, and the witness w serves as a decryption key. Security ensures that …
encrypt a message, and the witness w serves as a decryption key. Security ensures that …
Factoring and pairings are not necessary for io: Circular-secure lwe suffices
We construct indistinguishability obfuscation (iO) solely under circular-security properties of
encryption schemes based on the Learning with Errors (LWE) problem. Circular-security …
encryption schemes based on the Learning with Errors (LWE) problem. Circular-security …
Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
H Wee - Annual International Conference on the Theory and …, 2022 - Springer
We present a new, simple candidate broadcast encryption scheme for N users with
parameter size poly (log N). We prove security of our scheme under a non-standard variant …
parameter size poly (log N). We prove security of our scheme under a non-standard variant …
Optimal broadcast encryption from pairings and LWE
Abstract Boneh, Waters and Zhandry (CRYPTO 2014) used multilinear maps to provide a
solution to the long-standing problem of public-key broadcast encryption (BE) where all …
solution to the long-standing problem of public-key broadcast encryption (BE) where all …
Candidate iO from homomorphic encryption schemes
We propose a new approach to construct general-purpose indistinguishability obfuscation
(iO). Our construction is obtained via a new intermediate primitive that we call split fully …
(iO). Our construction is obtained via a new intermediate primitive that we call split fully …